Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:36

General

  • Target

    1155a8ba9e2938719286e75474fcf847.exe

  • Size

    461KB

  • MD5

    1155a8ba9e2938719286e75474fcf847

  • SHA1

    3416c9c9b9b40f0af0b791f5466f57b75933e007

  • SHA256

    064ac5bfe688e2b42940f1c79de0deef19ce0f50b660345d68e4a86e3fed5d83

  • SHA512

    89874b01b4aec9de405b54b300aee377d53af4de370032ee16e7a94b893250935125d184ce7c69c748a4a0ae966fa71527937af7a0f94deb39ed8b97da663a9b

  • SSDEEP

    6144:YU5npygCyAbShbUAPRNN8m7eV+wGiMQPgR47DWmvqiVNyUMJq7xU5lG:YU5nBqEhmqeVTGiM+7CmvqiVcJqilG

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1155a8ba9e2938719286e75474fcf847.exe
    "C:\Users\Admin\AppData\Local\Temp\1155a8ba9e2938719286e75474fcf847.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1220

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\tjl63C2.tmp

          Filesize

          130KB

          MD5

          edbca2efc4fdb3682e04c47fcd507a54

          SHA1

          0b835d29b3d57be55f8ca1c9d6c383e1aade55ff

          SHA256

          7afd9ee080229083d62ec60b32c9f77424bcd4ee8ec30dca7b709f7a3f2a2adf

          SHA512

          6425121a7bc263eacb2be56b515af23e87632a1f52acc97af72f6b50bcaa3967b2ab946c9703bb347ccee94ecc6e0c21c4d6a939968724d09d183e22382a3655

        • memory/1220-1-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/1220-4-0x00000000002D0000-0x0000000000343000-memory.dmp

          Filesize

          460KB

        • memory/1220-5-0x00000000002D0000-0x0000000000343000-memory.dmp

          Filesize

          460KB

        • memory/1220-6-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB